Cyber Security Budgets Are Misspent

A leading cyber security services company, Integrity360, has announced its findings from a Twitter poll to gain visibility into cyber security budgets and over surplus solutions within businesses. Their conclusion is that almost 30% of polled businesses have between 31-40 tools that are not required in their tech stack  

The poll, which was conducted between 8-10 March, found that over 30% of businesses believe that 30% of their budget is being allocated to tools and solutions that are not being used to their full potential.  

In addition, almost 30% of those surveyed agree that they have more than 31-40 tools and solutions within their tech stack that could be removed due to overlapping and unused features. This is a worrying figure when cyber security breaches continue to rise, and businesses are left with gaps that could give cyber attackers a route in. 

The CTO of Integrity360, Richard Ford, commented: “Whilst businesses recognise the need to allocate more budget towards cyber security, the difficulty lies in knowing where to apportion the spend...  It’s easy to throw money at all the shiny new tech and solutions on the market, but this results in disparate systems, with too many tools deployed for specific purposes, that ultimately go unmanaged and underutilised.” 

Furthermore, 46% of polled respondents believe the most damaging impact of a cyber security breach to be the consequential financial damage.

“Businesses need a cyber security strategy that provides full visibility over their tech stack and the solutions they have, those they need and those they can do without... An overabundance of solutions with features that overlap or aren’t required, is an accident waiting to happen, and a drain on budget and efficiency”, Ford commented. 

At a time of economic downturn when cyber security budgets are tight and risks are heightened, spending money on unnecessary and unused solutions is a business risk. Action to get rid of outdated systems, to consolidate different platforms and convergence of technologies us the best way optimise spending as well as improving overall security posture, according to Ford. 

 

You Might Also Read: 

Many Cyber Security Experts Don’t Understand The Systems They Are Trying To Secure:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« World Backup Day 
Bitbucket Backup Methods »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

General Dynamics Information Technology (GDIT)

General Dynamics Information Technology (GDIT)

General Dynamics IT delivers cyber security services to defend critical information and infrastructure.

National Cyber Security Centre (NCSC) - Netherlands

National Cyber Security Centre (NCSC) - Netherlands

NCSC Netherlands coordinates enhancing the cyber resilience of the Netherlands in the digital domain.

ARC Advisory Group

ARC Advisory Group

ARC is a leading technology research and advisory firm with expertise in both information technologies (IT) and operational technologies (OT)

Uniscon

Uniscon

Uniscon is a leading provider of cloud security solutions in Europe.

Basis Technology

Basis Technology

Basis Technology provides software solutions for text analytics, information retrieval, digital forensics, and identity resolution.

Qubitekk

Qubitekk

Qubitekk has developed quantum cryptography solutions for the machine-to-machine (M2M) communications market.

LinkUp

LinkUp

LinkUp is a leading data-driven job search company. Every day we index millions of job openings directly from employer websites.

Dale Peterson

Dale Peterson

Dale Peterson, a leading ICS security and control system IT information expert, provides consulting services to assess and improve the security of SCADA and DCS.

Iowa Cyber Hub

Iowa Cyber Hub

Iowa Cyber Hub is a cybersecurity education partnership between Iowa State University and Des Moines Area Community College.

Tokio Marine HCC

Tokio Marine HCC

Tokio Marine HCC is a leading specialty insurance group with a Financial and Professional product line including Tech and Cyber.

Cyber Command - Romania

Cyber Command - Romania

Cyber Command represents the military authority responsible for the development, protection and resilience of military IT networks and services that support the Romanian Force Structure.

Opora

Opora

Opora is the leading cybersecurity provider of adversary behavior analytics “ABA” and preemptive security solutions.

Managed IT Services

Managed IT Services

Managed IT Services is a managed IT Services Company offering a diverse range of Cyber Security services and IT solutions.

ELK Analytics

ELK Analytics

ELK Analytics is a specialized Managed Security Services Provider (MSSP) that focuses on endpoint security and monitoring & alerting for any type of structured or unstructured data.

EasySec Solutions

EasySec Solutions

EasySec Solutions provides a cyber-security platform, based on a combination of the zero trust model and the software-defined security management.

Creative Network Innovations (CNI)

Creative Network Innovations (CNI)

Creative Network Innovations is a leader in providing advanced IT and cybersecurity solutions.